Author, Consultant, Computer Expert
| Forensics | Speaking | Class Notes | Research
This segment of the website is to provide a list of research papers that reference my work and other information regarding places where my work has had some impact.
My books and articles have been referenced by numerous computer scientists, including several Ph.D. dissertations. A few of those references are included here:
- An assessment of user response to phishing attacks: the effects of fear and self-confidence by Deanna House, Ph.D. Dissertation in Information Systems, University of Texas Arlington.
- Assessment of Users' Information Security Behavior in Smartphone Networks- PhD dissertation of Mohammadjafar Esmaeili Eastern Michigan University.
- A cryptographically-based operating system security model that protects against privileged attackers. By Christian Pain Ph.D. Dissertation Murdoch University School of Information Technology
- Reference Model Based High Fidelity Simulation Modeling For Manufacturing Systems by Hansoo Kim Ph.D. Dissertation, School of Industrial and Systems Engineering Georgia Institute of Technology.
- Leadership Styles and Information Security in Small Businesses: An Empirical Investigation by Debasis Bhattachary, Ph.D. Dissertation, University of Phoenix.
- The adoption of business-to-business systems by small and medium enterprises in Amman and the perceptions of its influence on performance and efficiency by Anals A. AlBakry, Ph.D. Dissertation, University of Southern Queensland.
- Models, Services and Security In Modern Online Social Networks, Ph.D. dissertation of Alessio Bonti Deakin University, Australia.
- Design of a Forensic Overlay Model for Application Development Linlin Ke, Master’s Thesis, College of Engineering, University of Canterbury.
- Forensic Analysis of Linux Physical Memory: Extraction and Resumption of Running Processes. ED Mougoue, Master’s Thesis, James Madison University.
- Motivations behind Software Piracy: From the viewpoint of Computer Ethics Theories. Bethelhem Tadele, Master’s Thesis University of Oulu (Scandinavia).
- Securing CAN Bus Communication: An Analysis of Cryptographic Approaches by Jennifer Ann Bruton. Master’s Thesis National University of Ireland, Galway.
- Hackers, spies, and stolen secrets: protecting law firms from data theft by Alan W. Ezekiel. Harvard Journal of Law & Technology Volume 26, Number 2 Spring 2013Taming the diversity of information assurance & security - Journal of Computing Sciences in Colleges Volume 23, Issue 4 (April 2008) J. Paul Myers, Sandra Riela.
- Adding information assurance to the curriculum - Journal of Computing Sciences in Colleges Volume 22, Issue 2 (December 2006) Richard Weiss.
- Effect of Windows XP Firewall on Network Issues in Informing Science and Information Technology Volume 4, 2007 Al-Rawi(King Faisal University Saudi Arabia) ,Lansari (Zayed University UAE).
- Assessing Risks of Policies to Patch Software Vulnerabilities Radianti, Sveen, and Gonzalez.
- A study of efficient avoidance in the event of DNS(domain name system) failure - Proceedings of the 8thConference on 8th WSEAS International Conference on Automation and Information - Volume 8 Lin, Hwang, Lin.
- Embracing the Diversity of Information Assurance & Security - Myers
- A study of efficient avoidance in the event of DNS (domain name system) failure -Yang, Hyon, and Hankyu.
- Social and Organizational Aspects of Information Security Management -K. Michael.
- The Problems and Policy Alternatives for Cyber Security in the Networking Age by Lee Ki Shik.
- Securing Small Business: - The Role of Information Technology Policy. Batten and Castleman.
- The Impact of Virtual Private Network (VPN) on a Company's Network. Powell, J.M.
- Thinking Globally: Incorporating an International Component in Information Security Curricula. Kiswani and Al-Bakari.
- Security, ethics and electronic commerce systems: cybercrime and the need for information sharing security White and Long.
- The Expanded Risk Horizon of Accounting Networks Utilizing Wireless Technology - David R. Fordham -AIS Educator Journal Volume: 4 Issue: 1 2009.
- Researches on the IPv6 Network safeguard linked system - Ma Yue, Lian Hong, and Zhang Xiao Feng- Computer Science and Information Technology (ICCSIT), 2010 3rd IEEE International Conference 2010.
- Migration from Microsoft to Linux on Servers and Desktops. –Kumar.
- Decision making process in migration from Microsoft to Linux –Kumar.
- Influence of copyrights over the relationships in elearning Ivan Pogarcic, Marko Pogarcic, Matej Pogarcic Polytechnic of Rijeka, University of Rijeka, Faculty of Law, University of Ljubljana.
- Using Whois Based Geolocation and Google Maps API for support cybercrime investigations, Asmir Butkovic et. al.
- Odyssey of Data Security With A New Perception. Ankita & Lavisha
- Cyber Law: Approach to Prevent Cyber Crime. M Verma, SA Hussain, SS Kushwah.
- The Internet-EDI Systems Adoption by Enterprises in Jordan: Descriptive Analysis of Adoption, Strategies and Benefits by Anas Al Bakri International Journal of Internet and Distributed Systems.
- Encryption Protocol using some Pieces of Message as Key by S. Prakancharoen - International Journal of Applied Computer Technology.
- A Patient Privacy Protection Scheme for Medical Information System by by Lu, Wu, Liu, Chen, and Guo. Journal of Medical Systems October 2013.
- A study of information security awareness and practices in Saudi Arabia by Alarifi, A.; SISAT, Univ. of Wollongong, Wollongong, NSW, Australia. doi: 10.1109/ICCITechnol.2012.6285845.
- Secure login by using One-time Password authentication based on MD5 Hash encrypted SMS by Sediyono, E.; Satya Wacana Christian Univ., Salatiga, Indonesia; Santoso, K.I. ; Suhartono. doi: 10.1109/ICACCI.2013.6637420.
- Design and Implementation of a Virtual Calculation Centre (VCC) for Engineering Students, by Alaeddine. Published in International Journal of Online Engineering. 2010, Vol. 6 Issue 1, p18-23.
- Artificial Intelligence Tool and Electronic Systems Used to Develop Optical Applications, By Tecpoyotl-Torres et. al. Chapter 10 in the book Advances in Lasers and Electro Optics.
- The entry on ‘computer crime and security’ in the Encyclopedia of Computer Science and Technology cites my Computer Security Fundamentals textbook.
- University of British Columbia Law Review "In Plain View R V Jones and the Challenge of Protecting Privacy in an era of computer search"
- "Researches on the IPv6 Network safeguard linked system" Computer Science and Information Technology (ICCSIT), 2010 3rd IEEE International Conference on (Volume:7 ).
- The Criminalization of Identity Theft under the Saudi Anti-Cybercrime Law 2007 Journal of International Commercial Law and Technology vol 9, no2 by Suhail Almerdas.
- An Optimized and Secured VPN with Web Service Networking and Communication Engineering vol 6, No2; by A. Balasubramanian, A. Hemanth Kumar, R. Prasanna Venkatesan.
- Factors Affecting the Implementation Of Management Information System In Selected Financial Cooperatives In Nairobi. Published in the International Journal of Social Sciences and Project Planning Management, Vol 1, Issue 2, 2014.
- A New Classification Scheme for Intrusion Detection Systems by Bilal Beigh published in the International Journal of Computer Network and Information Security vol 6, No. 8, July 2014.
- Santoso, E. (2014, June). The Role of Biometrics Technology To Support E-Governance In Public And Business Administration. International Scientific Conference “e-governance”
- Mughal, S. (2014) Counter Measures to Mitigate Cyberstalking Risks: A Value Focused Multiple Criteria Approach.
- Dragan, A. (2014). Hacking and Computer Crimes Computer Fraud - A Comparative Look at the New Criminal Code and the Criminal Code of the Republic of Moldova. AGORA International Journal of Juridical Sciences No. 1, pp 29-34.
- Ramakic, A. Bundalao, Z. (2014). Data Protection in Microcomputer Systems And Networks. Acta Tehnica Corviniensis – Bulletin of Engineering (University of Bosnia and Herzegovina)
- "Preventing Document Leakage through Active Document" by Aaber, Crowder, Fadhel, and Wills. World Congress on Internet Security (WorldCIS-2014).
- Public Perception vs. the Reality of Bluetooth Security. Janczewski & Wong, International Conference on Information Resources Management (2010).
- Security, ethics and electronic commerce systems: cybercrime and the need for information sharing security. Kisswani1 & Al-Bakro. International Journal of Liability and Scientific Enquiry. DOI 10.1504/IJLSE.2010.033357.
- An Overview of Information and Communication Technology (ICT) in Jordan: Review the Literature of Usage, Benefits and Barriers. Al Bakri. International Journal of Internet and Distributed Systems. Vol.1 No.2(2013), Article ID:31349,DOI:10.4236/ijids.2013.12002.
- Not So Funny Funny-Money: The Threat of North Korean Counterfeiting of U.S. Currency. Corbett. Stevenson University Forensics Journal. Vol 4 2013.
- Pendekatan Model Ontologi Untuk Merepresentasikan Body of Knowledge Digital Chain of Custody by Prayudi, Luthi, Pratama. Jurnal Cybermaticka. Vol2, No 2 (2014)
Chain of Custody: State of the Art. By Prayudi and Sn.
International Journal of Computer Applications (0975 – 8887).
Volume 114 – No. 5, March 2015
- Prayudi, Y., Ashari, A., & Priyambodo, T. K. (2014). Digital Evidence Cabinets: A Proposed Frameworks for Handling Digital Chain of Custody. Int. J. Comput. Appl, 109(9), 30-36.
- Issac, R. M. (2011, March). Application of Cybernetics in Cyber Criminology. In Proceedings of the UGC Sponsored National Seminar on Cyber Criminology (NSCC~ 2011) at BPC College, Piravom, Kerala, India on (pp. 101-110).
- Aaber, Z. S., Crowder, R. M., Chang, V., Fadhel, N. F., & Wills, G. B. (2014, December). Towards a Framework for Securing a Document outside an Organisational Firewall. In Cloud Computing Technology and Science (CloudCom), 2014 IEEE 6th International Conference on (pp. 1057-1062). IEEE.
- Miškovic, V., Milosavljević, M., Adamović, S., & Jevremović, A. Application of Hybrid Incremental Machine Learning Methods to Anomaly Based Intrusion Detection. methods, 5, 6.
Graham, C. (2013). Terrorism. com:
Classifying Online Islamic Radicalism as a Cybercrime. Journal
Article| October, 21(8), 10am.
Universities using my books
A number of colleges and universities around the world have used, or are using one or more of my books as textbooks. Below is an exemplary sample of some of those universities.
1. Auburn University
2. University of Texas at Dallas
3. University Of Oklahoma
4. Arizona Western College
5. Kent State University Ohio
6. Pennsylvania State University
7. University Of Nebraska
8. University of North Dakota
9. Illinois State University
10. Western Illinois University
11. University Of South Carolina
12. University of Wyoming
13. Florida State University
14. East Tennessee State University
15. The Citadel
16. University Of The Incarnate Word
17. Midwestern State University
18. University Of S Carolina-Lancaster
19. Southeast Missouri State University
20. George Mason University
21. Queen’s College New York
22. American Military University
23. Columbus State University
24. Texas Christian University
25. Liberty University
26. Illinois Institute of Technology
27. Rochester Institute of Technology
28. Wentworth Institute of Technology
29. Western Nevada College
30. Eastern Florida State College
31. Florida State College
32. University of Southern Florida Sarasota
33. College Of So Nevada-Cheyenne
34. College Of S Nevada-W Charleston
35. Calumet College – University of St. Joseph
36. University of Dhaka (Bangladesh)
37. Kurukshetra University (India)
38. Universiti Malaysia Sarawak (Malaysia)
39. Trinity College of Puerto Rico
40. Technological Institute of the Phillipines
41. Nigeria University
42. SRM University Chennai India
43. Louisiana Technical University
44. Brookdale Community College
45. Hagerstown Community College
46. Wake Technical Community College
47. Nashville State Community College
48. Delmar College
49. Southwestern Community College
50. Charter Oak State College
51. Triton College
52. Hartford Community College
In addition some of my books have been translated into additional languages including German, Arabic, Korean, and Mandarin.
My computer science expertise has been sought
out by reporters including:
• CNN Money interviewed me regarding alleged unbreakable cryptography http://money.cnn.com/2011/09/02/technology/unhackable_code/
• CBS SmartPlanet interviewed me regarding NSA and cryptography http://www.smartplanet.com/blog/bulletin/nsa-proof-products-protective-or-a-profit-motive/
• E-Books directory lists my “Moving from Windows to Linux” book as one of the top 10 Linux books http://www.e-booksdirectory.com/linux/top10.html.
• Lawrence Journal World interviewed me for a hacking story that was published August 6, 2006. The article was entitled "Hackers infiltrate Web site".